Proposal Keno1
Proposal Keno1
PREPARED BY:
NAME ID NUMBER
1. KENO ABEBE_______________________________________RU 0417/11
2. HUNDESA DIRIBA__________________________________RU 0388 /11
3. ABDI TILAHUN_____________________________________RU 0418/11
4. FUFA GADISA______________________________________RU 0465 /11
Approval Sheet
This is certified that The Project Entitled On Assosa University Graduate Credential
Verification System Will Be Developed and Submitted By:
1. Keno Abebe___________________
2. Hundesa Diriba_________________
3. Abdi Tilahun___________________
4. Fufa Gadisa____________________
Project proposal submitted to the Department of Information Technology of Assosa University in
a Partial Fulfillment of Requirement for Bachelor Degree in Information Technology.
Advisor’ Name Signature Date
Mr. BERHANU A (MSC) _____________ _____________
Table of Contents
ABSTRACT...............................................................................................................................................1
CHAPTER ONE........................................................................................................................................2
1. Introduction.......................................................................................................................................2
1.1 Background of the Organization..............................................................................................2
1.2 Statement Problem of the project.............................................................................................3
1.3 Proposed system description.....................................................................................................3
1.3.1 Description and Purpose of the Proposed System...........................................................4
1.4 Objective of Project...................................................................................................................5
1.4.1 General Objective..............................................................................................................5
1.4.2 Specific Objectives.............................................................................................................5
1.5 Scope of Project.........................................................................................................................5
1.5.1 Scope in...............................................................................................................................5
1.5.2 Scope out.............................................................................................................................5
1.6 Significance of the Project.........................................................................................................5
1.7 Feasibility...................................................................................................................................6
1.7.1 Economic Feasibility..........................................................................................................6
1.7.2 Technical Feasibility..........................................................................................................6
1.7.3 Operational Feasibility......................................................................................................6
1.7.4 Political Feasibility.............................................................................................................7
1.8 Team Configuration..................................................................................................................7
1.9 Methodology of the Project.......................................................................................................8
1.9.1 Data Collection Methodology............................................................................................8
1.9.2 System Development Methodology...................................................................................8
1.10 System Development Tools......................................................................................................10
1.11 Project Scheduling and Budget...............................................................................................11
1.11.1 Project Scheduling...........................................................................................................11
1.11.2 Budget (Cost) Analysis....................................................................................................11
Reference..................................................................................................................................................12
List of Table
Table 1 Team Management......................................................................................................................7
Table 2 Hardware tools for system development..................................................................................10
Table 3 Software tools for system development....................................................................................10
Table 4 Project Scheduling Gantt chart................................................................................................11
Table 5 Cost for Project..........................................................................................................................11
List of Figure
Figure 1 Iterative method.........................................................................................................................9
ABSTRACT
Forgery has long crept into our educational system and counterfeit certificate(s) and document(s)
have the upper hand in various certificate and degrees awarding institutions. Invalid studentship
has become greater than valid studentship. The need for a student verification system has
become necessary to checkmate and expunge invalid studentship, invalid documents, and invalid
certificates yielding for the authenticity of certificates and documents. This project is titled
Assosa University Graduation credential verification System. The proposed model is concerned
with verifying certificates (graduate, postgraduate) issued from Assosa University and
processing several academic requests from the graduated students in the future. The graduation
credential verification system for Assosa University provides comfortable communication
among Assosa University and outside organization(s) as the nation’s source for accurate degree
data. Moreover, it will be a web-based system where the users will be provided with comfortable
interfaces to interact with Assosa University for their immediate requirements in a trustworthy
manner from anywhere. The system will have a great significance on the Assosa University as
well as the Ministry of Education in the future. This is an attempt from Ethiopians for Ethiopians
to obliterate the counterfeit from the educational systems.
CHAPTER ONE
1. Introduction
A Credential verification system is an application program used to verify that something rightly
and legally belongs to an organization’s collection. The Credential verification system is used to
know whether the certificate provided is legal and rightly issued for the student or not. In this
context, it is also used to verify that a student belongs to an institution and to confirm that he or
she is properly registered in a particular department running any of the institution’s programs and
checking whether the student credentials are correct even if their name is registered and
certificate is given for them. This credential verification system is an electronic and
computerized means of verifying someone’s claim of studentship or validating a degree
certificate by an institution using an output clearly showing the truth or false of his or her claim.
1.1 Background of the Organization
Assosa University is one of the third generations Public Universities in Ethiopia, which was
established in May 2011 by the Council of Ministers decree number 215/2011. The cornerstone
was laid on May 4, 2009. The University has been established to produce qualified and dedicated
labor that the country needs. The qualified and dedicated laborers would participate in
conducting scientific research, providing community service to the community they have come
from. All the activities done by the university aim to strengthen and realize the growth and
transformation plan.
The University is located in Assosa town, which is the capital city of Benishangul Gumuz
Regional State. It is located at a distance of 660 kilometers away from Addis Ababa,
210kilometers south of the Grand Ethiopian Renaissance Dam/GERD/ and 96 km East of the
Ethio-Sudanese border.
The University officially embarked on its service in June 2011G.C. The university began the
teaching-learning program at Assosa Agricultural College. The university had taut aching-
learning at Assosa Agricultural College. Since 2013G.C, the University has moved to its main
campus, which was granted by the Assosa Town Administration.
requirements. In the existing manual system, the new system was considered operationally
feasible.
1.7.4 Political Feasibility
Our proposed system behaviorally feasible cannot cause any harm to the government. Our
system is free from any political and environmental difficulties. The system that we are going to
develop will not contradict any governmental system and peace of country so our system will be
politically feasible.
1.8 Team Configuration
In our team, every person of the group must do every task, so the group participates in every
stage of planning, analysis, and design of this project by sharing ideas. Since an entire member
of the team exists at the same level (or responsibility) to do the project, for reviewing each other
work, to reduce time consumption, to make the member fully knowledgeable & to increase the
project quality, our group organization is based on Decentralized control Team organization.
Above all the object-oriented methodology is selected because it is the current applicable model
that uses different models to analyze and design the project.
The team will use the iterative method and object-oriented design for the development of the
project because of its suitability to develop a good and efficient system since it makes as
backward and forward for solving errors
Fi
g
u
re
1
Iterative method
Reference
[1]. Warasart, M., and Kuacharoen, P. (2012). Paper-based Document Authentication using
Digital Signature and QR Code. International Conference on Computer Engineering and
Technology, Retrieved from https://www.researchgate.net/publication/267427243
[2]. Osman, G., and Omar, S.S. (2016). Cloud-Based Graduation Certificate Verification Model.
Proceedings of Academics World 54th International Conference, Malacca, Malaysia. Retrieved
from https://www.worldresearchlibrary.org/up_proc/pdf/571-14861269431620.pdf
[3]. Musee, M.N. (2015). An academic certification verification system based on cloud
computing environment, 3(1), 55-88. Retrieved from:
http://erepository.uonbi.ac.ke/bitstream/handle/11295/90179/Musee_An%20Academic
%20Certification%20Verification%20Sytem%20Based%20On%20Cloud%20Computing
%20Environment.pdf? Sequence=3&isAllowed=y.
[4] asu.edu.et